Crash Course in Modernization. A whitepaper from mrc

Save this PDF as:
 WORD  PNG  TXT  JPG

Size: px
Start display at page:

Download "Crash Course in Modernization. A whitepaper from mrc"

Transcription

1 Crash Course in Modernization A whitepaper from mrc

2 Introduction Modernization is a confusing subject for one main reason: It isn t the same across the board. Different vendors sell different forms of modernization. Each claims their way is the best way. Each promises a result that looks modern. Be warned, not all modernization methods are equal. Allow me to share with you the most important rule of modernization. This is what many modernization vendors hope you don t know: There is much more to modernization than an end result that looks modern. This whitepaper will give you a crash course on modernization. It will help you understand what must happen in the modernization process and explain your modernization options. In the first part of this whitepaper, you will learn about common areas of change that potentially impact modernization. The second part of this whitepaper outlines the many modernization options and explains the advantages and disadvantages of each. First, let s examine what has changed to cause the need for application modernization. What has changed Understanding what has changed since your original applications were created is the first step towards successful modernization. This chart provides a brief overview of the common changes we will examine in this whitepaper: The business has changed Make a list of all the ways your business has changed since the creation of your original applications. Here are a few questions to consider. You will think of more. Has the government passed any laws that affect your 1

3 business? Have taxes changed? Have your products or customers changed? Has your business grown? Have your selling methods changed? Once you ve made your list, take a moment and review it. If your company is like most, the list is probably longer than you thought. Now, ask yourself this question: Do my old applications address all of my current business needs? Again, if your company is like most, the answer is no. Keep this in mind because it s important: If your business has changed to the point where your old applications no longer address your business needs, those applications must change. Now, some vendors will tell you that you can put a modern looking face on top of those old applications and fix your problems. That is false. A modern face doesn t magically make your old applications address your present business needs. If you want to address your current business needs, the underlying applications must change. How exactly should your old applications change? It all depends on when they were created. For example, if they are over 15 years old, they were built for a world that didn t rely on the internet. If they were designed for use before the internet became widely used, they require major changes. Here s why: The internet has changed Over the last 20 years, we ve moved from individual company networks, to a network that covers the world (the web). The rise of the web forever altered the business landscape. For example, the web broadened most companies potential customer base. It changed the way many companies sell to their customers, communicate with their inside and outside sales forces, and manage their distribution channels. It reduced the need for companies to operate within a physical location. Applications created before the web became widely used in the business world are fundamentally different than those created after. They weren t built to communicate with other applications. They weren t built for a connected world. They were largely character based and often required some training before use. How have current applications changed? Current applications are built for a networked world. They communicate via the web and with other applications. They include graphical user interfaces and are designed with usability in mind. How do these changes affect modernization? Applications created before the web was widely used were built for a different era. They were built to perform different functions. To modernize these types of applications for a web based world, two things must change: First, they must change from a character based to a graphical user interface. Second, the entire application structure must change. Why do pre internet applications need a different structure? When the internet became widely used in the business world, two things happened. First, programming paradigms shifted to address the changing needs brought on by the web. Second, the entire application structure changed to better fit the requirements and opportunities of the web. Now, some vendors will tell you that you can place a graphical user interface on top of your old applications and call them modern. This fails to address two important problems. First, it doesn t address the business changes. Second, it doesn t address the application structure and changing programming methods. In other words, it leaves you with a modern looking application that doesn t account for changes to your business and wasn t designed for a web world. 2

4 Why is the changing programming paradigm and application structure so important? Keep reading Programming paradigms have changed Applications built before the web became widely used were often created using a procedurally based programming paradigm. Without diving too deep into the technical aspects of programming, procedural programming provides a series of step by step instructions for the application to carry out. The application follows these instructions and cannot deviate from the pre determined path. This method worked well in the past because these applications didn t live on the web and were only used by trained employees. This changed when the internet became popular. Companies realized that their old applications didn t translate to the web. They were character based. They were ugly and difficult to use. As a result, programming paradigms changed, and event driven programming was born. Event driven programming is designed for use on the web, because it provides the user with choices. Rather than pre determined steps, the application is guided by user generated events, such as mouse clicks. The image below illustrates the differences between procedural and event driven paradigms. You ll notice a pre determined path in the procedural application, while the user determines the path in the event driven application. When you modernize, you must design your applications for use on the web, which means they must take an event driven approach. Any modernization method that leaves you with procedural applications isn t really modernization. Now, some vendors will tell you that you can keep your old procedural applications and add events to them. Technically, it s true. With enough work, you can make a procedurally based application appear event driven (although it is still procedurally based). But that s like saying you can add fog lights to your car with a pair of flashlights and some duct tape. It might do the trick in the short term, but you re just patching up outdated technology. It doesn t change the programming paradigm. It also doesn t change another critical aspect of the application that has changed since the web rose to prominence: The application structure. 3

5 Application Structure has changed As programming paradigms adapted to a changing world, application structure changed as well. Over time, applications moved from a monolithic structure to an atomization of function. The old procedural programming methods resulted in very large (monolithic) applications, containing thousands of lines of code. Wikipedia provides a good definition of monolithic applications: A monolithic application is self contained, and independent from other computing applications. The design philosophy is that the application is responsible not just for a particular task, but can perform every step needed to complete a particular function. These applications were so large because every function of the application was programmed into the code itself. That means if you had different applications sharing common functions, each function was built into each application separately. They couldn t share code with other applications. This image illustrates the monolithic application structure. Because of their large size and inability to share code, monolithic applications were difficult to create and maintain. As a result, application structure moved to an atomization of function. These days, applications use building blocks of code (also called objects ) which work together as a larger system of applications. Each object performs a specific task and can communicate with other objects to create larger applications. The image below illustrates how the two previously mentioned applications would be built using modern methods: 4

6 As you can see, atomizing function is a far more intelligent design structure. Applications built in this way are easier to build and maintain, and work well on the web. Here are a few differences between the two structures: 1. Maintenance: Maintaining a monolithic application is difficult, whereas maintaining applications that atomize function are far easier. Here are three of the biggest issues that contribute to this difference in maintenance difficulty: a. The workforce has changed: Because these applications were created so long ago (often years), the original developers are usually no longer with the company. Additionally, they were created with outdated languages (COBOL, Pascal, Fortran, etc ) which are not taught much in colleges these days. These applications are usually maintained by those who don t understand the language and didn t build the initial application. b. Too many dependencies: Monolithic applications were built with too many dependencies between procedures. This meant that a change to one area of the application could alter, or even break, another area. On the flip side, using the atomization of function approach, a change to one object does not affect other objects. c. No modularity: Monolithic applications were built without modularity, which is defined by Wikipedia below: Modularity is desirable, in general, as it supports reuse of parts of the application logic and also facilitates maintenance by allowing repair or replacement of parts of the application without requiring wholesale replacement. 5 In other words, applications designed without modularity can t re use or share other parts of application logic. For example, if your product pricing algorithm changes, every application

7 containing the old pricing algorithm must be changed. Comparatively, the atomization of function approach relies on code sharing. When a change is needed, only one block of code needs to be altered. d. Spaghetti code: As more changes and updates are added to these monolithic applications, the code becomes more and more convoluted. After a while, the application code turns into what is commonly known as spaghetti code, a name given to twisted and tangled code. The more updates and fixes that are applied to monolithic applications, the more difficult they are to maintain. 2. Developing monolithic applications is not efficient: As you can probably imagine, developing these large applications is not very efficient. Developing applications that share and re use code is a far more efficient method for development. Would you rather hand code thousands of lines of code, or call premade functions? What does the change in application structure mean to modernization? If you want modern applications that are easy to maintain and address your changing business needs, the underlying application structure must change to employ an atomization of function. Now, some vendors will tell you that you can update your old monolithic applications with web capabilities. You can even lay a graphical interface on top of your old applications and make them appear modern. Be warned, while this approach will give you modern looking applications, it leads to problems. First, you still must maintain and support your old monolithic applications, which as mentioned above, is no easy task. Second, now you also must maintain the graphical interface. Essentially, this approach provides modern looking applications while significantly increasing maintenance complexity. Additionally, the changing application structure alters another aspect of your business applications: The database. The next section addresses the changing database and what it means for your applications. The database has changed In the past, databases only stored data and applications stored logic. Thanks to database and programming advancement, current databases do more than simple data storage. These days, much of the logic previously included in the applications can be moved down to the database level. This results in smaller, more maintainable application code. For example, when a customer placed an order in the past, the application instructed the database to decrease inventory. Now, that can happen automatically in the database. Those who still use outdated applications cannot take advantage of new database enhancements, such as triggers, constraints, user defined functions (UDFs), etc... They are confined to their old database until they modernize their applications. Summary Much has changed since your original applications were created. First and foremost, if your company is like most, your business needs have changed. If your underlying applications no longer address your current business needs, they must change. 6

8 Secondly, when the web became widely used in the business, programming paradigms and application structure changed to address the new requirements of the web. As a result, if your applications were created before the web became widely used, they must be replaced. The old programming methods and applications structures don t translate over to a web world. Companies who refuse to modernize these applications are left with maintenance difficulties and applications that can t take advantage of the web. Now that you have a better understanding of what s changed, let s look at 5 different modernization options, as well as the pros and cons of each. Modernization Options Figuring out which modernization method provides the most benefit to your company is difficult. Every vendor will tell you their method is best. Before you even begin looking, it s important that you understand your options. The next part of this whitepaper explains the five methods available as well as a few pros and cons of each. The image below summarizes each method: 7

9 Screen scraping Screen scraping creates new, modern looking interfaces for your legacy applications. It makes old applications look new without actually updating the old applications. A screen scraping tool does nothing more than scrape the information off your existing applications and present it in a graphical interface. Pros Vendors sell this modernization method on speed and price. It is usually the cheapest option and provides modern looking applications quickly without altering the underlying applications. Additionally, with enough work, modern features can be integrated into the screen scraped applications. Cons There are quite a few drawbacks to the screen scraping approach. First, it does not actually modernize your applications. While it leaves you with a modern looking application, it does not address the issues associated with legacy applications that we ve just covered. Specifically, you re left with old monolithic, procedurally based applications which lack capabilities and aren t designed for a web world. In the end, maintenance is actually more difficult, time consuming, and expensive as you will have to maintain your old underlying applications as well as the screen scraped applications. On top of that, every time the underlying applications change, the screen scraped application must be remade. To learn about all the drawbacks to screen scraping, read this whitepaper entitled, What screen scraping vendors don t want you to know. Code Converters Code converters take old applications written in outdated programming languages and convert the code to a modern programming language. For example, if you have applications written in COBOL, you can run them through a code converter and turn them into Java. Pros Code converters address the problem of maintaining an old programming language. They provide a quick way to turn outdated code into modern code without learning a new programming language. There is usually more developer support for new languages, and you won t need to rely on a dwindling talent pool to maintain your old applications. Cons Code conversion doesn t fix the underlying problems with legacy applications. It converts the code to a modern language, but it leaves you with procedurally based monolithic applications. All the maintenance issues associated with monolithic applications will still apply. All the problems associated with procedural based applications will still apply. Code converters don t magically turn your old code into object oriented, eventdriven applications. Worse yet, it doesn t give you a graphical user interface, which is a must for the web world. They leave you in the exact same place you started, only with applications built in a different programming language. To properly modernize, you will still need to change the application structure and create graphical user interfaces for your applications. Rip and replace The rip and replace method is exactly what it sounds like. Build completely new applications using modern programming languages, methods, databases, etc In short, you throw out the old applications and create new ones. Pros 8

10 Completely replacing all your old applications fixes all the problems associated with running a business on outdated applications. It leaves you with applications built to address your current business needs. It leaves you with applications that can take advantage of the most modern methods, languages, and databases. The end result is applications that are built for modern day business, are easy to maintain, and can grow with your business. Cons This is perhaps the most risky approach. Throwing out your old, yet functioning, applications increases the chances that you might break something. Often, companies attempting this approach either need significant technical training in new programming methods for their staff that knows their business, or they need to train the newly hired technical staff in how their business applications need to work. Additionally, since you re building new applications from the ground up, this is by far the most time consuming, and therefore expensive, method. In short, the end result is good, but the risks and expenses are high. Buy new applications You can also buy pre built application packages. It s similar to the rip and replace method, but you don t have to build new applications. This method requires that you implement the new software and migrate your data over for use on the new platform. Pros It fixes the problems associated with running a business on outdated applications. It also leaves you with applications built for the web, complete with an event driven structure. It s usually less time consuming than the rip and replace method, and typically comes with less risk. Also, since all the applications are pre built, they require little testing. Cons This method is typically extremely expensive. You re paying more for the luxury of moving to pre built, pretested applications, and the time savings that come with this method. Also, because the applications weren t designed for your company, they aren t customized to your specific business needs and won t exactly fit how you do business. These solutions usually require a fair amount of customization, either by you, or by the vendor. This increases the cost associated with an already expensive modernization method. Extend and Surround This approach involves gradually surrounding your old applications with completely new and modern applications. It lets you modernize different parts of your systems gradually, as the need arises. For example, if you need to bring your order entry applications to the web, you can do so without touching other aspects of your system. After that project is complete, you can focus on other areas to modernize. Pros This approach lets you modernize gradually at your own pace. It leaves you with truly modern applications, and eliminates much of the risk associated with the rip and replace method. Additionally, it lets you re use certain parts of your old applications that are still crucial to your business. For example, your old order entry system might be character based and only used internally. Using the extend and surround approach, you can build a web based order entry application that shares logic and uses the same database as your old applications. Once you ve created a web based order entry application for your customers, you can focus on modernizing the internal system. Cons 9

11 It takes time to develop these new applications and requires that you have a developer on staff who is familiar with modern programming languages and methods. However, there are development tools that eliminate much of the effort (and time) as well as the need to be fluent in modern programming languages when creating these new applications. Conclusion Modernization is a confusing subject if you re not sure about everything that must happen in the modernization process. Before properly taking on a modernization project, you must understand what needs to happen. In order to understand what needs to happen, you must understand what has changed. The first question you need to ask yourself is: Do my old applications address my current business needs. Chances are, the answer to that question is no. Most businesses have changed dramatically since their original applications were created. If your applications no longer address all your business needs, then your applications must be changed. The second question you need to ask yourself is: Were my old applications created before the web became widely used in the business world? If the answer is yes, and you truly want modern applications, your old applications must eventually be replaced. Why must they be replaced? When the web became widely used, a couple of very important aspects of application development changed. First, programming paradigms shifted from procedurally based to event driven. This move was necessitated by the change in the way users interact with applications. Second, application structure moved from monolithic to an atomization of function. Monolithic applications are difficult to create, difficult to maintain, and don t translate well to the web. For these reasons, your applications must be replaced if they were created before the web became widely used. Now that you understand what has changed, as well as the modernization options available, you can make an informed decision specific to your company. Just remember, there s much more to modernization than applications that appear modern. Since 1981, mrc has helped companies of all sizes modernize their legacy applications. For more information on modernization, visit mrc s website at 10

If you like this guide and you want to support the community, you can sign up as a Founding Member here:

If you like this guide and you want to support the community, you can sign up as a Founding Member here: Introduction Hey Sam here. Thanks for getting access to Vid Invision Enterprise. I m super excited that you ve come on board This guide is to help you to understand how to navigate the Vid Invision Enterprise

More information

Follow Up. Brought to you by

Follow Up. Brought to you by Email Follow Up 4 Steps to Generating up to 98% More Sales from Your Prospects Brought to you by Similar to social media, email drip campaigns are a marketing tool used for follow-up, not lead generation.

More information

SEO Get Google 1 st Page Rankings

SEO Get Google 1 st Page Rankings 1. SEO can decrease your cost per acquisition Another benefit of SEO is that it is free. It is far less expensive than advertising to acquire customers. The only costs in SEO are the costs to hire the

More information

Acing the QuickBooks Online Certification Exam

Acing the QuickBooks Online Certification Exam ProAdvisor Program THE ACCOUNTANT S GUIDE TO Acing the QuickBooks Online Certification Exam Insider tips, tricks and facts to help you pass the first time. Brought to you by Intuit s professional QuickBooks

More information

Taskbar: Working with Several Windows at Once

Taskbar: Working with Several Windows at Once Taskbar: Working with Several Windows at Once Your Best Friend at the Bottom of the Screen How to Make the Most of Your Taskbar The taskbar is the wide bar that stretches across the bottom of your screen,

More information

Creating Custom Financial Statements Using

Creating Custom Financial Statements Using Creating Custom Financial Statements Using Steve Collins Sage 50 Solution Provider scollins@iqacct.com 918-851-9713 www.iqaccountingsolutions.com Financial Statement Design Sage 50 Accounting s built in

More information

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS.

GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. GET CLOUD EMPOWERED. SEE HOW THE CLOUD CAN TRANSFORM YOUR BUSINESS. Cloud computing is as much a paradigm shift in data center and IT management as it is a culmination of IT s capacity to drive business

More information

The Benefits of SMS as a Marketing and Communications Channel From The Chat Bubble written by Michael

The Benefits of SMS as a Marketing and Communications Channel From The Chat Bubble written by Michael The Benefits of SMS as a Marketing and Communications Channel 1 Why companies and organizations should do SMS. We re going to talk through from an organization or marketers point of view, what SMS is good

More information

Lenovo Data Center Group. Define a different future

Lenovo Data Center Group. Define a different future Lenovo Data Center Group Define a different future Think change is hard? We don t. Concerned about the risks and complexities of transformation We see new ways to seize opportunity. Wrestling with inflexible

More information

Intro. Scheme Basics. scm> 5 5. scm>

Intro. Scheme Basics. scm> 5 5. scm> Intro Let s take some time to talk about LISP. It stands for LISt Processing a way of coding using only lists! It sounds pretty radical, and it is. There are lots of cool things to know about LISP; if

More information

If Statements, For Loops, Functions

If Statements, For Loops, Functions Fundamentals of Programming If Statements, For Loops, Functions Table of Contents Hello World Types of Variables Integers and Floats String Boolean Relational Operators Lists Conditionals If and Else Statements

More information

Trombone players produce different pitches partly by varying the length of a tube.

Trombone players produce different pitches partly by varying the length of a tube. Trombone players produce different pitches partly by varying the length of a tube. 7 Variables A variable is a connection between a name and a value.* That sounds simple enough, but some complexities arise

More information

Numeric Precision 101

Numeric Precision 101 www.sas.com > Service and Support > Technical Support TS Home Intro to Services News and Info Contact TS Site Map FAQ Feedback TS-654 Numeric Precision 101 This paper is intended as a basic introduction

More information

When Milliseconds Matter. The Definitive Buying Guide to Network Services for Healthcare Organizations

When Milliseconds Matter. The Definitive Buying Guide to Network Services for Healthcare Organizations When Milliseconds Matter The Definitive Buying Guide to Network Services for Healthcare Organizations The Changing Landscape of Healthcare IT Pick any of the top trends in healthcare and you ll find both

More information

Close Your File Template

Close Your File Template In every sale there is always a scenario where I can t get someone to respond. No matter what I do. I can t get an answer from them. When people stop responding I use the Permission To. This is one of

More information

4 KEY FACTORS FOR DATA QUALITY ON A DATA LAKE (OR: HOW TO AVOID THE DATA SWAMP) JOSH HERRITZ MIOSOFT CORPORATION MIOsoft Corporation.

4 KEY FACTORS FOR DATA QUALITY ON A DATA LAKE (OR: HOW TO AVOID THE DATA SWAMP) JOSH HERRITZ MIOSOFT CORPORATION MIOsoft Corporation. 4 KEY FACTORS FOR DATA QUALITY ON A DATA LAKE (OR: HOW TO AVOID THE DATA SWAMP) JOSH HERRITZ MIOSOFT CORPORATION The trends in digital business promise that the future holds an unprecedented volume, variety,

More information

Excel Basics Rice Digital Media Commons Guide Written for Microsoft Excel 2010 Windows Edition by Eric Miller

Excel Basics Rice Digital Media Commons Guide Written for Microsoft Excel 2010 Windows Edition by Eric Miller Excel Basics Rice Digital Media Commons Guide Written for Microsoft Excel 2010 Windows Edition by Eric Miller Table of Contents Introduction!... 1 Part 1: Entering Data!... 2 1.a: Typing!... 2 1.b: Editing

More information

MAPLOGIC CORPORATION. GIS Software Solutions. Getting Started. With MapLogic Layout Manager

MAPLOGIC CORPORATION. GIS Software Solutions. Getting Started. With MapLogic Layout Manager MAPLOGIC CORPORATION GIS Software Solutions Getting Started With MapLogic Layout Manager Getting Started with MapLogic Layout Manager 2008 MapLogic Corporation All Rights Reserved 330 West Canton Ave.,

More information

6 WAYS Google s First Page

6 WAYS Google s First Page 6 WAYS TO Google s First Page FREE EBOOK 2 CONTENTS 03 Intro 06 Search Engine Optimization 08 Search Engine Marketing 10 Start a Business Blog 12 Get Listed on Google Maps 15 Create Online Directory Listing

More information

HOW TO USE THE INSTANCING LAB IN BRYCE 7.1 PRO/ A complete tutorial

HOW TO USE THE INSTANCING LAB IN BRYCE 7.1 PRO/ A complete tutorial http://www.daz3d.com/forums/viewthread/3381/ Rashad Carter, Posted: 03 July 2012 01:43 PM HOW TO USE THE INSTANCING LAB IN BRYCE 7.1 PRO/ A complete tutorial The Instancing Lab in Bryce 7.1 Pro is a mysterious

More information

Alongside this is AVB, an IEEE standards based technology that could stand on its own or underpin many of the existing networked audio protocols.

Alongside this is AVB, an IEEE standards based technology that could stand on its own or underpin many of the existing networked audio protocols. AES67 and AES70 The complete industry solution for audio and control Over the past three decades the audio industry has taken a number of steps to move into the digital age. Some argue that the digital

More information

EMF Temporality. Jean-Claude Coté Éric Ladouceur

EMF Temporality. Jean-Claude Coté Éric Ladouceur EMF Temporality Jean-Claude Coté Éric Ladouceur 1 Introduction... 3 1.1 Dimensions of Time... 3 3 Proposed EMF implementation... 4 3.1 Modeled Persistence... 4 3.2 Modeled Temporal API... 5 3.2.1 Temporal

More information

Divisibility Rules and Their Explanations

Divisibility Rules and Their Explanations Divisibility Rules and Their Explanations Increase Your Number Sense These divisibility rules apply to determining the divisibility of a positive integer (1, 2, 3, ) by another positive integer or 0 (although

More information

SHA-3 interoperability

SHA-3 interoperability SHA-3 interoperability Daniel J. Bernstein Department of Computer Science (MC 152) The University of Illinois at Chicago Chicago, IL 60607 7053 djb@cr.yp.to 1 Introduction: You thought software upgrades

More information

Module 16. Software Reuse. Version 2 CSE IIT, Kharagpur

Module 16. Software Reuse. Version 2 CSE IIT, Kharagpur Module 16 Software Reuse Lesson 39 Basic Ideas on Software Reuse Specific Instructional Objectives At the end of this lesson the student would be able to: Explain the advantages of software reuse. Identify

More information

Animator Friendly Rigging Part 1

Animator Friendly Rigging Part 1 Animator Friendly Rigging Part 1 Creating animation rigs which solve problems, are fun to use, and don t cause nervous breakdowns. - http://jasonschleifer.com/ - 1- CONTENTS I. INTRODUCTION... 4 What is

More information

Mr G s Java Jive. #11: Formatting Numbers

Mr G s Java Jive. #11: Formatting Numbers Mr G s Java Jive #11: Formatting Numbers Now that we ve started using double values, we re bound to run into the question of just how many decimal places we want to show. This where we get to deal with

More information

Devising a Cloud Strategy that Doesn t Cast a Shadow on App Performance

Devising a Cloud Strategy that Doesn t Cast a Shadow on App Performance Devising a Cloud Strategy that Doesn t Cast a Shadow on App Performance By Nick Cavalancia Performance is the penalty that you pay in exchange for the agility, flexibility and cost savings of the cloud.

More information

How & Why We Subnet Lab Workbook

How & Why We Subnet Lab Workbook i How & Why We Subnet Lab Workbook ii CertificationKits.com How & Why We Subnet Workbook Copyright 2013 CertificationKits LLC All rights reserved. No part of this book maybe be reproduced or transmitted

More information

The Advantages of a ready-to-go Intranet

The Advantages of a ready-to-go Intranet The Advantages of a ready-to-go Intranet Why choose a ready-to-go intranet? Regardless of the size, amount of employees or field of work, almost any business experiences an increase in productivity and

More information

Ubuntu Server Succinctly

Ubuntu Server Succinctly 1 Ubuntu Server Succinctly By José Roberto Olivas Mendoza Foreword by Daniel Jebaraj 2 Copyright 2016 by Syncfusion, Inc. 2501 Aerial Center Parkway Suite 200 Morrisville, NC 27560 USA All rights reserved.

More information

Chapter 1: Distributed Information Systems

Chapter 1: Distributed Information Systems Chapter 1: Distributed Information Systems Contents - Chapter 1 Design of an information system Layers and tiers Bottom up design Top down design Architecture of an information system One tier Two tier

More information

Lecture 22: Garbage Collection 10:00 AM, Mar 16, 2018

Lecture 22: Garbage Collection 10:00 AM, Mar 16, 2018 CS18 Integrated Introduction to Computer Science Fisler, Nelson Lecture 22: Garbage Collection 10:00 AM, Mar 16, 2018 Contents 1 What is Garbage Collection? 1 1.1 A Concrete Example....................................

More information

The attendee will get a deep dive into all the DDL changes needed in order to exploit DB2 V10 Temporal tables as well as the limitations.

The attendee will get a deep dive into all the DDL changes needed in order to exploit DB2 V10 Temporal tables as well as the limitations. The attendee will get a deep dive into all the DDL changes needed in order to exploit DB2 V10 Temporal tables as well as the limitations. A case study scenario using a live DB2 V10 system will be used

More information

5 R1 The one green in the same place so either of these could be green.

5 R1 The one green in the same place so either of these could be green. Page: 1 of 20 1 R1 Now. Maybe what we should do is write out the cases that work. We wrote out one of them really very clearly here. [R1 takes out some papers.] Right? You did the one here um where you

More information

In fact, as your program grows, you might imagine it organized by class and superclass, creating a kind of giant tree structure. At the base is the

In fact, as your program grows, you might imagine it organized by class and superclass, creating a kind of giant tree structure. At the base is the 6 Method Lookup and Constant Lookup As we saw in Chapter 5, classes play an important role in Ruby, holding method definitions and constant values, among other things. We also learned how Ruby implements

More information

Promoting Component Architectures in a Dysfunctional Organization

Promoting Component Architectures in a Dysfunctional Organization Promoting Component Architectures in a Dysfunctional Organization by Raj Kesarapalli Product Manager Rational Software When I first began my career as a software developer, I didn't quite understand what

More information

Hyper-V Top performance and capacity tips

Hyper-V Top performance and capacity tips Hyper-V Top performance and capacity tips Introduction This paper discusses the changes in Windows/Hyper-V 2012 and what that means from the perspective of the business and managing the capacity. It will

More information

QuickBooks 2008 Software Installation Guide

QuickBooks 2008 Software Installation Guide 12/11/07; Ver. APD-1.2 Welcome This guide is designed to support users installing QuickBooks: Pro or Premier 2008 financial accounting software, especially in a networked environment. The guide also covers

More information

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL

CDW LLC 200 North Milwaukee Avenue, Vernon Hills, IL Coordinating Conferencing and Collaboration Vital unified communications capabilities offer a solid foundation for an integrated view of the collaborative environment. To make the most of the opportunities

More information

Using GitHub to Share with SparkFun a

Using GitHub to Share with SparkFun a Using GitHub to Share with SparkFun a learn.sparkfun.com tutorial Available online at: http://sfe.io/t52 Contents Introduction Gitting Started Forking a Repository Committing, Pushing and Pulling Syncing

More information

[Compatibility Mode] Confusion in Office 2007

[Compatibility Mode] Confusion in Office 2007 [Compatibility Mode] Confusion in Office 2007 Confused by [Compatibility Mode] in Office 2007? You re Not Alone, and Here s Why Funnybroad@gmail.com 8/30/2007 This paper demonstrates how [Compatibility

More information

Information System Architecture. Indra Tobing

Information System Architecture. Indra Tobing Indra Tobing What is IS Information architecture is the term used to describe the structure of a system, i.e the way information is grouped, the navigation methods and terminology used within the system.

More information

NetApp Snapshot Technology, when does a snapshot grow?

NetApp Snapshot Technology, when does a snapshot grow? NetApp Snapshot Technology, when does a snapshot grow? Source : http://blog.hernanjlarrea.com.ar/index.php/netapp-snapshot-technology-when-does-a-snapshot-grow/ by Hernán J. Larrea Let s take a quick but

More information

VLOOKUP Hacks. 5 Ways to Get More Use from VLOOKUP Excel University ALL RIGHTS RESERVED

VLOOKUP Hacks. 5 Ways to Get More Use from VLOOKUP Excel University ALL RIGHTS RESERVED 5 Ways to Get More Use from VLOOKUP ALL RIGHTS RESERVED VLOOKUP Hack #1: Sort Order Issue VLOOKUP Hack #1 helps address the sort issue. Sort issue? Yes, and the sort issue has confuzzled many an Excel

More information

SPRITES Moving Two At the Same Using Game State

SPRITES Moving Two At the Same Using Game State If you recall our collision detection lesson, you ll likely remember that you couldn t move both sprites at the same time unless you hit a movement key for each at exactly the same time. Why was that?

More information

Topic Notes: Java and Objectdraw Basics

Topic Notes: Java and Objectdraw Basics Computer Science 120 Introduction to Programming Siena College Spring 2011 Topic Notes: Java and Objectdraw Basics Event-Driven Programming in Java A program expresses an algorithm in a form understandable

More information

Hello! by Arash Khosravian & Farhad Beheshti. from Anetwork

Hello! by Arash Khosravian & Farhad Beheshti. from Anetwork Email Marketing Hello! by Arash Khosravian & Farhad Beheshti from Anetwork 1 Why Email? PEOPLE HAVE DRAMATICALLY CHANGED HOW THEY LIVE AND WORK. In traditional marketing, companies focus on finding customers

More information

System development, design & implementation

System development, design & implementation System development, design & implementation Design of software The following are the principle for any software design : Modularity and partitioning : Top down methods are used through out the analysis

More information

Healthcare IT Optimization: 6 Mistakes to Avoid Along the Way

Healthcare IT Optimization: 6 Mistakes to Avoid Along the Way Healthcare IT Optimization: 6 Mistakes to Avoid Along the Way Healthcare IT: Transforming for tomorrow s needs Healthcare organizations face a sea of change in what will soon be required of them. Great

More information

ADO.NET from 3,048 meters

ADO.NET from 3,048 meters C H A P T E R 2 ADO.NET from 3,048 meters 2.1 The goals of ADO.NET 12 2.2 Zooming in on ADO.NET 14 2.3 Summary 19 It is a rare opportunity to get to build something from scratch. When Microsoft chose the

More information

Understanding Recursion

Understanding Recursion Understanding Recursion Brian L. Stuart February 23, 2015 It has been suggested that the single most original contribution that the field of Computer Science has made to the tapestry of human intellect

More information

An Overview of Visual Basic.NET: A History and a Demonstration

An Overview of Visual Basic.NET: A History and a Demonstration OVERVIEW o b j e c t i v e s This overview contains basic definitions and background information, including: A brief history of programming languages An introduction to the terminology used in object-oriented

More information

How to Get Your Inbox to Zero Every Day

How to Get Your Inbox to Zero Every Day How to Get Your Inbox to Zero Every Day MATT PERMAN WHATSBESTNEXT.COM It s possible to get your email inbox to zero and keep it there, even if you get hundreds of emails a day. It s not super complicated,

More information

Smoother Graphics Taking Control of Painting the Screen

Smoother Graphics Taking Control of Painting the Screen It is very likely that by now you ve tried something that made your game run rather slow. Perhaps you tried to use an image with a transparent background, or had a gazillion objects moving on the window

More information

DESIGNING RESPONSIVE DASHBOARDS. Best Practices for Building Responsive Analytic Applications

DESIGNING RESPONSIVE DASHBOARDS. Best Practices for Building Responsive Analytic Applications DESIGNING RESPONSIVE DASHBOARDS Best Practices for Building Responsive Analytic Applications CONTENTS Responsive Design and Embedded Analytics...1 6 Principles and Best Practices... 2 Tools of the Trade...

More information

David Werth IDEAS Design & Grayout Aerosports Albuquerque, q NM & Indianapolis, IN

David Werth IDEAS Design & Grayout Aerosports Albuquerque, q NM & Indianapolis, IN 1 David Werth IDEAS Design & Grayout Aerosports Albuquerque, q NM & Indianapolis, IN Dave@IDEASDesigninc.com Dave@GrayOut.com Moderator: (Jacquie Warda) (Jacquie B Airshows) 2 Founder and CEO of IDEAS

More information

Learn a lot beyond the conventional VLOOKUP

Learn a lot beyond the conventional VLOOKUP The Ultimate Guide Learn a lot beyond the conventional VLOOKUP Hey there, Howdy? =IF ( you are first timer at Goodly, Then a very warm welcome here, Else for all my regular folks you know I love you :D

More information

MAPLOGIC CORPORATION. GIS Software Solutions. Getting Started. With MapLogic Layout Manager

MAPLOGIC CORPORATION. GIS Software Solutions. Getting Started. With MapLogic Layout Manager MAPLOGIC CORPORATION GIS Software Solutions Getting Started With MapLogic Layout Manager Getting Started with MapLogic Layout Manager 2011 MapLogic Corporation All Rights Reserved 330 West Canton Ave.,

More information

The Root Cause of Unstructured Data Problems is Not What You Think

The Root Cause of Unstructured Data Problems is Not What You Think The Root Cause of Unstructured Data Problems is Not What You Think PRESENTATION TITLE GOES HERE Bruce Thompson, CEO Action Information Systems www.expeditefile.com What is this presentation all about?

More information

2016 All Rights Reserved

2016 All Rights Reserved 2016 All Rights Reserved Table of Contents Chapter 1: The Truth About Safelists What is a Safelist Safelist myths busted Chapter 2: Getting Started What to look for before you join a Safelist Best Safelists

More information

Legal Notice: Copyright 2012 and 2013 Hitman Advertising, all rights reserved. You are responsible for your own advertising in your business.

Legal Notice: Copyright 2012 and 2013 Hitman Advertising, all rights reserved. You are responsible for your own advertising in your business. Legal Notice: COPYRIGHT: Copyright 2012 and 2013 Hitman Advertising, all rights reserved. LIMITS OF LIABILITY / DISCLAIMER OF WARRANTY: This report is NOT legal or accounting advice. You need to do your

More information

DECnet to TCP/IP Migration Considerations

DECnet to TCP/IP Migration Considerations DECnet to TCP/IP Migration Considerations Scott Wattum 16-Jan-2003 Disclaimer this is not meant to be a definitive discussion on migrating from DECnet to TCP/IP; more a starting point to look at what types

More information

IP FUNDAMENTALS FOR LIVE MULTI-CAMERA VIDEO A PRIMER FOR BROADCASTERS AND PRODUCTION FACILITIES

IP FUNDAMENTALS FOR LIVE MULTI-CAMERA VIDEO A PRIMER FOR BROADCASTERS AND PRODUCTION FACILITIES IP FUNDAMENTALS FOR LIVE MULTI-CAMERA VIDEO A PRIMER FOR BROADCASTERS AND PRODUCTION FACILITIES LIVE VIDEO: SMARTER, BETTER-CONNECTED, MORE FLEXIBLE LIVE VIDEO: SMARTER, BETTER-CONNECTED, MORE FLEXIBLE

More information

1 Achieving IND-CPA security

1 Achieving IND-CPA security ISA 562: Information Security, Theory and Practice Lecture 2 1 Achieving IND-CPA security 1.1 Pseudorandom numbers, and stateful encryption As we saw last time, the OTP is perfectly secure, but it forces

More information

The Definitive Guide to MongoDB Analytics

The Definitive Guide to MongoDB Analytics The Definitive Guide to MongoDB Analytics Analytics on MongoDB is a different beast than what you re familiar with. Don t expect to fire up your existing analytics tool, point it at MongoDB, and go. This

More information

Oracle Applications in a Changing Business World. Legacy Oracle Applications Won't Be Around Forever. Will You?

Oracle Applications in a Changing Business World. Legacy Oracle Applications Won't Be Around Forever. Will You? Oracle Applications in a Changing Business World Legacy Oracle Applications Won't Be Around Forever. Will You? Ross Smith Chief Architect July 7, 2017 2 Oracle Applications in a Changing Business World

More information

ICANN Start, Episode 1: Redirection and Wildcarding. Welcome to ICANN Start. This is the show about one issue, five questions:

ICANN Start, Episode 1: Redirection and Wildcarding. Welcome to ICANN Start. This is the show about one issue, five questions: Recorded in October, 2009 [Music Intro] ICANN Start, Episode 1: Redirection and Wildcarding Welcome to ICANN Start. This is the show about one issue, five questions: What is it? Why does it matter? Who

More information

CISC-124. Casting. // this would fail because we can t assign a double value to an int // variable

CISC-124. Casting. // this would fail because we can t assign a double value to an int // variable CISC-124 20180122 Today we looked at casting, conditionals and loops. Casting Casting is a simple method for converting one type of number to another, when the original type cannot be simply assigned to

More information

SCHEME 7. 1 Introduction. 2 Primitives COMPUTER SCIENCE 61A. October 29, 2015

SCHEME 7. 1 Introduction. 2 Primitives COMPUTER SCIENCE 61A. October 29, 2015 SCHEME 7 COMPUTER SCIENCE 61A October 29, 2015 1 Introduction In the next part of the course, we will be working with the Scheme programming language. In addition to learning how to write Scheme programs,

More information

Introduction to Access 97/2000

Introduction to Access 97/2000 Introduction to Access 97/2000 PowerPoint Presentation Notes Slide 1 Introduction to Databases (Title Slide) Slide 2 Workshop Ground Rules Slide 3 Objectives Here are our objectives for the day. By the

More information

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures

Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next Generation Backup: Better ways to deal with rapid data growth and aging tape infrastructures Next 1 What we see happening today. The amount of data businesses must cope with on a daily basis is getting

More information

HOUR 4 Understanding Events

HOUR 4 Understanding Events HOUR 4 Understanding Events It s fairly easy to produce an attractive interface for an application using Visual Basic.NET s integrated design tools. You can create beautiful forms that have buttons to

More information

Easily Managed, Advanced Endpoint Security Results in 125,000 Safer Desktops and Happier Users

Easily Managed, Advanced Endpoint Security Results in 125,000 Safer Desktops and Happier Users Easily Managed, Advanced Endpoint Security Results in 125,000 Safer Desktops and Happier Users Providing better protection and improved performance Fairfax County Public Schools Customer Profile 11th largest

More information

Slashing Downtime from 24 Hours to 24 Minutes:

Slashing Downtime from 24 Hours to 24 Minutes: Slashing Downtime from 24 Hours to 24 Minutes: Technology Advancements Make Warm-Site Disaster Recovery Possible Don Beyer Director, Technical Services Oakwood Healthcare Louie Caschera Chief Information

More information

Intermedia s Private Cloud Exchange

Intermedia s Private Cloud Exchange Intermedia s Private Cloud Exchange This is a practical guide to implementing Intermedia s Private Cloud Exchange on AWS. Intermedia, the world s independent provider of Hosted Exchange, and AWS, the leading

More information

Your . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU

Your  . A setup guide. Last updated March 7, Kingsford Avenue, Glasgow G44 3EU fuzzylime WE KNOW DESIGN WEB DESIGN AND CONTENT MANAGEMENT 19 Kingsford Avenue, Glasgow G44 3EU 0141 416 1040 hello@fuzzylime.co.uk www.fuzzylime.co.uk Your email A setup guide Last updated March 7, 2017

More information

In the most general sense, a server is a program that provides information

In the most general sense, a server is a program that provides information d524720 Ch01.qxd 5/20/03 8:37 AM Page 9 Chapter 1 Introducing Application Servers In This Chapter Understanding the role of application servers Meeting the J2EE family of technologies Outlining the major

More information

Hello everyone, how are you enjoying the conference so far? Excellent!

Hello everyone, how are you enjoying the conference so far? Excellent! 1 Hello everyone, how are you enjoying the conference so far? Excellent! I m Andy Sutton, the e-builder User Experience Lead, and I m here to talk to you about User Experience. In this session, we re going

More information

Gustavo Alonso, ETH Zürich. Web services: Concepts, Architectures and Applications - Chapter 1 2

Gustavo Alonso, ETH Zürich. Web services: Concepts, Architectures and Applications - Chapter 1 2 Chapter 1: Distributed Information Systems Gustavo Alonso Computer Science Department Swiss Federal Institute of Technology (ETHZ) alonso@inf.ethz.ch http://www.iks.inf.ethz.ch/ Contents - Chapter 1 Design

More information

10 C Language Tips for Hardware Engineers

10 C Language Tips for Hardware Engineers 10 C Language Tips for Hardware Engineers Jacob Beningo - March 05, 2013 On its own, the software development process has numerous hazards and obstacles that require navigation in order to successfully

More information

Data Conversion Strategies for Yardi Voyager By: David Wolfe President - Lupine Partners

Data Conversion Strategies for Yardi Voyager By: David Wolfe President - Lupine Partners Data Conversion Strategies for Yardi Voyager By: David Wolfe President - Lupine Partners 2 Data Conversion Strategies for Yardi Voyager Is there a list of software systems that Yardi Voyager can convert

More information

. Digital Marketing Agency Telephone: Parliament Street, Floor 3, Office 6, Liverpool, L8 5RN

. Digital Marketing Agency Telephone: Parliament Street, Floor 3, Office 6, Liverpool, L8 5RN Email Digital Marketing Agency Telephone: 0151 203 2073 Email: info@e-blueprint.co.uk 25 Parliament Street, Floor 3, Office 6, Liverpool, L8 5RN Create an audience... In direct marketing, it s long been

More information

SOFTWARE ENGINEERING. Lecture 6. By: Latifa ALrashed. Networks and Communication Department

SOFTWARE ENGINEERING. Lecture 6. By: Latifa ALrashed. Networks and Communication Department 1 SOFTWARE ENGINEERING Networks and Communication Department Lecture 6 By: Latifa ALrashed Outline q q q q q q q q Define the concept of the software life cycle in software engineering. Identify the system

More information

The Ultimate Guide for Virtual Server Protection

The Ultimate Guide for Virtual Server Protection The Ultimate Guide for Virtual Server Protection 4 QUESTIONS EVERYONE SHOULD ASK ABOUT VIRTUAL SERVER DATA PROTECTION IT leadership should be looking to storage and data management teams to ensure they

More information

Blackfin Online Learning & Development

Blackfin Online Learning & Development Presentation Title: Multimedia Starter Kit Presenter Name: George Stephan Chapter 1: Introduction Sub-chapter 1a: Overview Chapter 2: Blackfin Starter Kits Sub-chapter 2a: What is a Starter Kit? Sub-chapter

More information

At Hewlett Packard Enterprise, an HR Transformation

At Hewlett Packard Enterprise, an HR Transformation At Hewlett Packard Enterprise, an HR Transformation Workday platform delivers advanced tools for strategically managing HPEs human capital Generally, a project of this scope would take up to three years

More information

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience

Digital Marketing Manager, Marketing Manager, Agency Owner. Bachelors in Marketing, Advertising, Communications, or equivalent experience Persona name Amanda Industry, geographic or other segments B2B Roles Digital Marketing Manager, Marketing Manager, Agency Owner Reports to VP Marketing or Agency Owner Education Bachelors in Marketing,

More information

Web Hosting. Important features to consider

Web Hosting. Important features to consider Web Hosting Important features to consider Amount of Storage When choosing your web hosting, one of your primary concerns will obviously be How much data can I store? For most small and medium web sites,

More information

The Fruits of Their Labor

The Fruits of Their Labor The Fruits of Their Labor Welch s saves money by upgrading to new IBM Power servers and the IBM XIV Storage System CUSTOMER: Welch's Food Inc., a cooperative HEADQUARTERS:Concord, Mass. BUSINESS: Leading

More information

MEAP Edition Manning Early Access Program Learn Hyper V in A Month of Lunches Covers Windows Server 2016 Version 3

MEAP Edition Manning Early Access Program Learn Hyper V in A Month of Lunches Covers Windows Server 2016 Version 3 MEAP Edition Manning Early Access Program Learn Hyper V in A Month of Lunches Covers Windows Server 2016 Version 3 Copyright 2017 Manning Publications For more information on this and other Manning titles

More information

Learning Windows IIS in a Month of Lunches

Learning Windows IIS in a Month of Lunches Learning Windows IIS in a Month of Lunches by Jason Helmick Chapter 4 Copyright 2014 Manning Publications 1 Before you begin 1 2 Deploying the web server 12 3 Exploring and launching a website 33 4 Managing

More information

BOP101. Becoming a Blackboard Content Editor Power User. The Content Editor Interface. Technology Training & Multimedia Development

BOP101. Becoming a Blackboard Content Editor Power User. The Content Editor Interface. Technology Training & Multimedia Development Technology Training & Multimedia Development BOP101 Becoming a Blackboard Content Editor Power User When you are creating material in a Blackboard Content Area, you will be using the Content Editor interface.

More information

Web $trategy. Fundamentals. A Book About Practical Web Strategy for the Non-Geek Anders Tufvesson

Web $trategy. Fundamentals. A Book About Practical Web Strategy for the Non-Geek Anders Tufvesson Web $trategy Fundamentals A Book About Practical Web Strategy for the Non-Geek Anders Tufvesson Reproduction ban This work is protected by copyright law. Reproduction is prohibited other than as specified

More information

Creating a Virtual Machine

Creating a Virtual Machine CurrentH1 411 APPENDIX C Creating a Virtual Machine This appendix shows how I created a virtual machine (VM) in which I then installed Windows Server 2003 R2 (and later WSS 3.0). Initially, Hour 2, Installing

More information

The compiler is spewing error messages.

The compiler is spewing error messages. Appendix B Debugging There are a few different kinds of errors that can occur in a program, and it is useful to distinguish between them in order to track them down more quickly. Compile-time errors are

More information

PROFESSIONAL PYTHON BY LUKE SNEERINGER DOWNLOAD EBOOK : PROFESSIONAL PYTHON BY LUKE SNEERINGER PDF

PROFESSIONAL PYTHON BY LUKE SNEERINGER DOWNLOAD EBOOK : PROFESSIONAL PYTHON BY LUKE SNEERINGER PDF Read Online and Download Ebook PROFESSIONAL PYTHON BY LUKE SNEERINGER DOWNLOAD EBOOK : PROFESSIONAL PYTHON BY LUKE SNEERINGER PDF Click link bellow and free register to download ebook: PROFESSIONAL PYTHON

More information

The data quality trends report

The data quality trends report Report The 2015 email data quality trends report How organizations today are managing and using email Table of contents: Summary...1 Research methodology...1 Key findings...2 Email collection and database

More information

Click to edit Master title style. Click to edit Master text styles

Click to edit Master title style. Click to edit Master text styles Click to edit Master title style Click to edit Master text styles Click to edit Master title style Click to edit Master text styles Leveraging Magento to Build Alternative Business Models #altmagento Brian

More information

Virtual vs Physical ADC

Virtual vs Physical ADC WHITEPAPER What are the primary differences and the pros and cons of virtual vs physical application delivery controllers? Snapt Technical Team sales@snapt.net pg. 1 Forward-thinking organizations are

More information